| Index: net/cert/ct_known_logs.cc
|
| diff --git a/net/cert/ct_known_logs.cc b/net/cert/ct_known_logs.cc
|
| index 0602581708e1e211b2d57939fed94ad6e9230f94..0f0338752fb5e7dc5e88220a58049f8fe0f7623e 100644
|
| --- a/net/cert/ct_known_logs.cc
|
| +++ b/net/cert/ct_known_logs.cc
|
| @@ -37,7 +37,8 @@ CreateLogVerifiersForKnownLogs() {
|
| // Add all qualified logs.
|
| for (const auto& log : kCTLogList) {
|
| base::StringPiece key(log.log_key, log.log_key_length);
|
| - verifiers.push_back(CTLogVerifier::Create(key, log.log_name, log.log_url));
|
| + verifiers.push_back(
|
| + CTLogVerifier::Create(key, log.log_name, log.log_url, log.log_domain));
|
| // Make sure no null logs enter verifiers. Parsing of all known logs should
|
| // succeed.
|
| CHECK(verifiers.back().get());
|
| @@ -48,7 +49,8 @@ CreateLogVerifiersForKnownLogs() {
|
| for (const auto& disqualified_log : kDisqualifiedCTLogList) {
|
| const CTLogInfo& log = disqualified_log.log_info;
|
| base::StringPiece key(log.log_key, log.log_key_length);
|
| - verifiers.push_back(CTLogVerifier::Create(key, log.log_name, log.log_url));
|
| + verifiers.push_back(
|
| + CTLogVerifier::Create(key, log.log_name, log.log_url, log.log_domain));
|
| // Make sure no null logs enter verifiers. Parsing of all known logs should
|
| // succeed.
|
| CHECK(verifiers.back().get());
|
|
|